CUPERTINO, Calif. - Oct. 14, 2003 - Symantec Corp. (Nasdaq: SYMC), the world leader in Internet security, today announced that Top Layer Networks' Attack Mitigator Ô Intrusion Prevention System has been certified as interoperable with the Symantec Enterprise Security Architecture version 1.1. The certified integration of the Attack Mitigator with the Symantec Enterprise Security Architecture provides enterprises with an industry leading, high-performance intrusion prevention solution that operates within Symantec's interoperable security management framework.
"By implementing industry leading solutions with a common framework, enterprises are able to reduce the complexities and costs associated with managing a best of breed, heterogeneous security environment," said Mike Reed, VP Business Development. "Utilizing the Symantec Enterprise Security Architecture, Top Layer and Symantec are able to provide organizations with interoperable, manageable, and scalable enterprise security solutions."
Top Layer joined the Symantec Technology Partner Program in March, and ensured integration through the use of the Symantec Enterprise Security Architecture Software Development Environment, a set of development tools provided by the program.
"The certification of Top Layer's Attack Mitigator marks the first integration of an ASIC-based appliance product with the Symantec Enterprise Security Architecture," said Steve Cullen, senior vice president, Symantec Enterprise Solutions. "This certification highlights the versatility of the Symantec Enterprise Security Architecture Software Development Environment for creating integration across many platforms."
Top Layer's Attack Mitigator
Top Layer's Attack Mitigator IPS is a family of high-performance, ASIC-based intrusion prevention solutions with precision blocking and control against the most prevalent cyber attacks. Hybrid attacks such as HTTP worms, DoS/DDoS attacks, protocol and traffic anomalies, IP spoofing, SYN flood attacks, and more are accurately detected and stopped in real-time. The Attack Mitigator IPS allows the network security administrator full control in selecting how the device will respond to detected attacks. Precise but flexible actions against blocking malicious and suspicious traffic include monitoring, alerting, limiting, and blocking. Attack Mitigator IPS offers 100 megabit through multi-gigabit solutions for maximum performance.
Symantec Enterprise Security Architecture
The Symantec Security Management System and other Symantec products are built in compliance with Symantec Enterprise Security Architecture, which provides a standards-based interoperability framework for Symantec and third-party solutions to work together to provide secure, manageable, and scalable enterprise security. Customer environments are heterogeneous and often contain security products from many vendors. Therefore, an interoperable architecture is a critical enabler to enterprises that need strong security and centralized management.
Symantec supports several third-party products through integration with Symantec Enterprise Security Architecture including Top Layer Attack Mitigator and ForeScout ActiveScout. Symantec also offers support through Symantec Event Collectors, which currently include: Symantec Event Collector for Network Associates ePO and VirusScan, Symantec Event Collector for Trend Micro Gateway and Groupware, Symantec Event Collector for Check Point VPN-1/Firewall-1, Symantec Event Collector for Cisco PIX, Symantec Event Collector for Enterasys Network Dragon and Symantec Event Collector for ISS RealSecure. In addition, the following Symantec solutions use Symantec Enterprise Security Architecture as a foundation: Symantec Client Security, Symantec Gateway Security, Symantec Host IDS, Symantec Vulnerability Assessment, Symantec Incident Manager, and Symantec Event Managers for AntiVirus, Firewall, Intrusion Detection and Client Security.
Symantec Technology Partner Program
The Symantec Technology Partner Program establishes standards for how diverse security and infrastructure products from multiple vendors can work together with Symantec technologies to simplify complex enterprise networks for joint customers. Qualified partner products can be integrated with Symantec's industry-leading security solutions and Symantec Enterprise Security Architecture. The Technology Partner Program offers comprehensive integration tools, development support, joint sales and marketing resources, and product certification. Partners whose solutions meet Symantec's established criteria for interoperability earn the use of applicable Symantec certification logos. Detailed information on the program procedures, requirements, and benefits can be found at www.symantec.com/technologypartners.
About Top Layer Networks, Inc.
Founded in 1997, Top Layer Networks (http://www.TopLayer.com) develops network security solutions that enable enterprises worldwide to protect their infrastructure and critical online resources from cyber threats. The company's patented ASIC-based products are engineered to deliver accurate and reliable protection mechanisms while operating as robust in-line network devices. Top Layer Networks is headquartered in Westboro, Massachusetts, with a sales and support presence in France, Germany, Japan, Korea, and the United Kingdom.
Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at www.symantec.com.
NOTE TO EDITORS: : If you would like additional information on Symantec Corporation and its products, please view the Symantec Press Center at http://www.symantec.com/PressCenter/ on Symantec's Web site. All prices noted are in US dollars and are valid only in the United States.
Symantec, the Symantec logo, VERITAS, and the VERITAS logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and certain other countries. Additional company and product names may be trademarks or registered trademarks of the individual companies and are respectfully acknowledged.